Mobile Phone Hardware Repair Technician
Become a Expert & Specialization in Mobile Phone Hardware Repair Technician
100% Placement Assistance | 1000+ Hiring Partners
About Mobile Phone Hardware Repair Technician
The Mobile Phone Hardware Repair Technician diagnoses problems and repairs the faulty module of the mobile phone.
Brief Job Description: The individual at work is responsible for rectifying faults in the mobile phone brought in by the customer. The individual receives the faulty mobile phone, diagnoses the problems, performs front end or hardware level repair as required, resolves software issues and ensures effective functioning before delivering back to customer.
Personal Attributes: The job requires the individual to have: attention to details, patience, ability to listen, steady hands, logical thinking and customer orientation. The individual must work on desk with different types of equipment.
Module 1: Network Fundamentals, Routing, and Switching Basics"Introduction to Networking Network topology architecture Network Standards and protocol stacks Physical Network Connections Ethernet LANs Ethernet Switching Introduction to Wireless LANs IP and IPv4v4 Addressing IPv4 Subnetting Introducing Basic IPv6 TCP and UDP Support and Management Protocols Communications Protocols Web Protocols Virtualization Fundamentals Introduction to Network Security Introduction to IP Telephony and VOIP Implementation Operating Cisco IOS Software and Junos Configuring a Router Exploring the Packet Delivery Process Troubleshooting a Simple Network Configuring Static Routing Understanding and Implementing VLANs and Trunking Routing Between VLANs Introducing Dynamic Routing Introducing OSPF Building Redundant Switched Topologies Improving Redundant Switched Topologies with EtherChannel Exploring Layer 3 Redundancy Introducing WAN Technologies Explaining the Basics of ACLs IP Services Automation and Programmability Implementing Wide Area Networks
Module 2: Core Routing and SwitchingExamining Cisco Enterprise Network Architecture Understanding Cisco Switching Paths Implementing Campus LAN Connectivity Building Redundant Switched Topology Implementing Layer 2 Port Aggregation Understanding EIGRP Implementing OSPF Optimizing OSPF Exploring EBGP Implementing Network Redundancy Implementing NAT Introducing Virtualization Protocols and Techniques Understanding Virtual Private Networks and Interfaces Understanding Wireless Principles Examining Wireless Deployment Options Understanding Wireless Roaming and Location Services Examining Wireless AP Operation Understanding Wireless Client Authentication Troubleshooting Wireless Client Connectivity Introducing Multicast Protocols Introducing QoS Implementing Network Services Using Network Analysis Tools Implementing Infrastructure Security Implementing Secure Access Control Understanding Enterprise Network Security Architecture Exploring Automation and Assurance Using Cisco DNA Center Examining the Cisco SD-Access Solution Understanding the Working Principles of the Cisco SD-WAN Solution Understanding the Basics of Python Programming Introducing Network Programmability Protocols Introducing APIs in Cisco DNA Center and vManage
Module 3: Advanced Enterprise Routing and switchingConfigure classic EIGRP and named EIGRP for IPv4 and IPv6 Optimize classic EIGRP and named EIGRP for IPv4 and IPv6 Troubleshoot classic EIGRP and named EIGRP for IPv4 and IPv6 Configure Open Shortest Path First (OSPF)v2 and OSPFv3 in IPv4 and IPv6 Optimize OSPFv2 and OSPFv3 behavior Troubleshoot OSPFv2 for IPv4 and OSPFv3 for IPv4 and IPv6 Implement route redistribution using filtering mechanisms Troubleshoot redistribution Implement path control using Policy-Based Routing (PBR) and IP SLAs Configure Multiprotocol-Border Gateway Protocol in IPv4 and IPv6 Optimize MP-BGP in IPv4 and IPv6 environments Troubleshoot MP-BGP for IPv4 and IPv6 Describe the features of Multiprotocol Label Switching Describe the major architectural components of an MPLS VPN Identify the routing and packet forwarding functionalities for MPLS VPNs Explain how packets are forwarded in an MPLS VPN environment Implement Cisco Internetwork Operating System Dynamic Multipoint VPNs Implement Dynamic Host Configuration Protocol Describe the tools available to secure the IPV6 first hop Troubleshoot Cisco router security features Troubleshoot infrastructure security and services
Module 4: Deploying Cloud SolutionsIntroduction to Cloud Computing Cloud Architectures Cloud Delivery Models Identity Access Management Amazon Storage Management Basic Operation of Amazon Linux JSON operation in AWS Resources Managing Virtual Machines (Instances) Configuring and attaching Load Balancer to Virtual Machines Content Delivery Service AWS’s DNS-as-a-Service Hosting Routing Policy AWS’s Database-as-a-Service Types of Databases Managing Databases Networking in AWS Cloud Securing and Monitoring the AWS Cloud Managing Applications Developer friendly services
Module 5: Implementing High Availability, Storage, and Security in the Cloud."High Availability and Business Continuity Minimizing and optimizing Infrastructure cost Manage and Implement the right infrastructure Network Design for a complex large scale deployment Implement the most appropriate data storage architecture Security management systems and compliance controls Design protection of Data at Rest controls Design protection of Data in Flight and Network Perimeter controls Scalability and Elasticity Cloud Migration and Hybrid Architecture Cloud Privacy and Security Governance and auditing for cloud operations. Threats, risk, and requirements landscape. Privacy, data, and digital identity. Data sensitivity, location, and legal jurisdiction. Cloud security approaches and challenges.
Module 6: Implementing Microsoft Azure Data SolutionUnderstanding Infrastructure-as-a-Service (IaaS), Platform-as-a-Service(PaaS), and Software-as-a-Service (SaaS) Public, Private, and Hybrid cloud models. Core Azure architectural components. Core Azure Services and Products Azure Solutions Azure management tools Securing network connectivity in Azure Core Azure Identity services Security tools and features Azure governance methodologies Monitoring and Reporting in Azure Privacy, Compliance, and Data Protection standards in Azure Working with Data Storage Enabling Team-Based Data Science with Azure Databricks Building Globally Distributed Databases with Cosmos DB Working with Relational Data Stores in the Cloud Performing Real-Time Analytics with Stream Analytics Orchestrating Data Movement with Azure Data Factory Monitoring and Troubleshooting Data Storage and Processing